Vulnerability Management Software

Find the best Vulnerability Management Software for your business. Compare product reviews and features to build your list.

What is Vulnerability Management Software?

Narrow results by:

Recommended Filters

Pricing Options

Popular Features

Users

Deployment

Why Capterra is free

Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast. Learn more about Vulnerability Control

Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. Learn more about Vulnerability Control

Streamline the aggregation and correlation of asset, threat, vulnerability and ticket data. Gain better visibility into your organization's risk posture with advanced risk scoring algorithms that provide business context beyond CVSS scores, such as asset criticality. Help your IT team prioritize the right vulnerabilities and effectively communicate progress to all your stakeholders. Easily scale these processes to millions of assets and tens of millions of cyber vulnerabilities. Learn more about Vulnerability Management Software

Gain greater risk intelligence by prioritizing your cyber vulnerabilities based on business criticality for more efficient remediation. Learn more about Vulnerability Management Software

NorthStar

by Conventus

An automated, integrated, data-driven platform that provides the most effective method of prioritizing and remediating the vulnerabilities and exposures that represent the greatest risk to your business. NorthStars flexible scoring model empowers organizations with the freedom and transparency to decide what factors best reflect their business needs and risk appetite. NorthStar Delivers: - Single Source of Truth - Completely customizable scoring - Simplified and Faster Data Integrations Learn more about NorthStar

Prioritize and remediate the vulnerabilities and exposures that matter most to your business. Learn more about NorthStar

Alert Logic's SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more - with 24/7 support & SOC services. Learn more about Alert Logic Vulnerability Mgmt

Get Vulnerability Management as part of Alert Logic's SIEMless Threat Management offerings, connecting platform, intel & experts. Learn more about Alert Logic Vulnerability Mgmt

Cryptosense

by Cryptosense

Cryptosense Analyzer software helps our customers find security weaknesses in the cryptography they use in their infrastructure and applications, and then fix them before they are exploited. We trace crypto use in applications, network protocols and cryptographic hardware, and pass it through our analysis algorithms to find vulnerabilities in key management, randomness generation, crypto use and more. Learn more about Cryptosense

Cryptosense provides software to detect and eliminate vulnerabilities caused by misuses of cryptography in apps and infrastructures. Learn more about Cryptosense

Protect your website or web application 365 days a year thanks to daily automated audits to detect your security flaws. Adopt the Offensive Cyber Security method to protect your business. Discover the high-performance web vulnerability scanner by HTTPCS: - Zero False Positive Guarantee - 100% Mapping (Headless Technology to crawl dynamic content) - Security Flaws listing : Top 10 OWASP, CVE and much more! - Countermeasures to apply - Replay the attacks to understand the risks incurred. Learn more about HTTPCS Security

Without technical expertise, run automated security audits to detect security flaws on your site or web application. Support provided. Learn more about HTTPCS Security

Patch Manager Plus is an automated patch management software that provides enterprises with a single interface for all patch management tasks. Works across platforms, helping you patch Windows, Mac, Linux & 300+ third-party applications. You can automate the scan for missing patches, test & approve for hassle-free patching, customize deployment policies to meet business needs, decline patches & generate vulnerability reports. Patch Manager Plus is now available both on cloud and on-premise. Learn more about Patch Manager Plus

Patch Manager Plus is an automated patch management software to patch Windows, Mac, Linux updates and 300+ third-party applications. Learn more about Patch Manager Plus

Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companies Learn more about Centraleyezer

Vulnerability Management that facilitates collaboration between Security Analysts, Management and Asset Owners and risk prioritization. Learn more about Centraleyezer

We provide an end-to-end Software Security platform to bring you objective data so you can make informed decisions regarding the security risks faced by your applications. We make tough decisions easier and this translates in cost reduction, risk mitigation, objective measurement, with the broadest language coverage and third party intergations to name but a few of the possibilities brought about by our platform. SAST and open source management of your entire portfolio. Learn more about Kiuwan

DevSecOps platform with SAST and SCA, IDE integration and distributed analysis to shield your applications from external threats Learn more about Kiuwan

Acunetix

by Acunetix

Acunetix leads the market in automatic web security testing technology that scans and audits all web applications including HTML5, JavaScript and Single Page Applications. Scans for 4500 vulnerabilities incl. SQLi and XSS among others. Used by Government, Military, Education, Telecommunications, Banking, Finance, and E-Commerce sectors, including many Fortune 500 companies. Acunetix offers a cost-effective, simple, scalable, and high availability solution. Available on Windows, Linux and Online Learn more about Acunetix

Vulnerability Management solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers remediation Learn more about Acunetix

Netsparker Security Scanner is an accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws by automatically exploiting the identified vulnerabilities in a read-only and safe way, and also produces a proof of exploitation. Therefore you can immediately see the impact of the vulnerability and do not have to manually verify it. Learn more about Netsparker Security Scanner

Accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Learn more about Netsparker Security Scanner

Nessus

by Tenable Network Security

Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities. Learn more about Nessus

Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities. Learn more about Nessus

Security management platform offering fully integrated security controls for threat detection and compliance management. Learn more about AlienVault USM

Security management platform offering fully integrated security controls for threat detection and compliance management. Learn more about AlienVault USM

Market leading vulnerability management solution providing complete ecosystem visibility, prioritized & automated remediation workflows Learn more about InsightVM

Market leading vulnerability management solution providing complete ecosystem visibility, prioritized & automated remediation workflows Learn more about InsightVM

Online vulnerability management system that allows you to scan current network, analyze its possible risks, and prepare reports. Learn more about Qualys VM

Online vulnerability management system that allows you to scan current network, analyze its possible risks, and prepare reports. Learn more about Qualys VM

OpenVAS

by Greenbone Networks GmbH

A set of SSL-secured vulnerability management tools including system scanner and access control manager. Learn more about OpenVAS

A set of SSL-secured vulnerability management tools including system scanner and access control manager. Learn more about OpenVAS

Probe.ly

by Probe.ly

Finds vulnerabilities or security issues in web applications and provides guidance on how to fix them. Learn more about Probe.ly

Finds vulnerabilities or security issues in web applications and provides guidance on how to fix them. Learn more about Probe.ly

Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies. Learn more about Snyk

Helps you use open source and stay secure and continuously find & fix vulnerabilities in your dependencies. Learn more about Snyk

HackerOne

by HackerOne

THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging Learn more about HackerOne

THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging Learn more about HackerOne

baramundi Management Suite

by baramundi Software USA

Automatic scanning and dashboard assessment of PC and server vulnerabilities. Ensure continuous security with patch/update management. Learn more about baramundi Management Suite

Automatic scanning and dashboard assessment of PC and server vulnerabilities. Ensure continuous security with patch/update management. Learn more about baramundi Management Suite

Twistlock

by Twistlock

Twistlock is the leading cloud native cybersecurity platform for the modern enterprise Learn more about Twistlock

Twistlock is the leading cloud native cybersecurity platform for the modern enterprise Learn more about Twistlock

ArcSight

by Micro Focus

User behavior analytics solution that helps identify internal and external threats. Learn more about ArcSight

User behavior analytics solution that helps identify internal and external threats. Learn more about ArcSight

Attack probability analysis tool that helps predict hacking attacks and develop prevention schemes. Learn more about AttackTree

Attack probability analysis tool that helps predict hacking attacks and develop prevention schemes. Learn more about AttackTree

Continuity Engine is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Learn more about Continuity Engine

Continuity Engine is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Learn more about Continuity Engine

CxSAST

by CHECKMARX

Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software. Learn more about CxSAST

Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software. Learn more about CxSAST

Cyberwatch

by Cyberwatch

Server vulnerability monitoring solution with integrated patch management functionality. Learn more about Cyberwatch

Server vulnerability monitoring solution with integrated patch management functionality. Learn more about Cyberwatch

DefectDojo

by 10Security

Security program and vulnerability management tool that allows you to manage your application security program. Learn more about DefectDojo

Security program and vulnerability management tool that allows you to manage your application security program. Learn more about DefectDojo

Demisto

by Demisto

An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack. Learn more about Demisto

An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack. Learn more about Demisto

Agentless technology for automating discovery and monitoring of networks, servers, and other applications in varied environments. Learn more about Elastic Detector

Agentless technology for automating discovery and monitoring of networks, servers, and other applications in varied environments. Learn more about Elastic Detector

FireMon

by FireMon

The FireMon platform manages devices across an organization to reduce complexity, increase compliance and improve network security. Learn more about FireMon

The FireMon platform manages devices across an organization to reduce complexity, increase compliance and improve network security. Learn more about FireMon

GAT

by IBLISS

Helps to establish your information security program and understand risks, improving digital security maturity by 94%. Learn more about GAT

Helps to establish your information security program and understand risks, improving digital security maturity by 94%. Learn more about GAT

Kenna

by Kenna Security

Kenna Security uses exploit intelligence feeds to identify vulnerabilities being exploited in the wild and put your company at risk. Learn more about Kenna

Kenna Security uses exploit intelligence feeds to identify vulnerabilities being exploited in the wild and put your company at risk. Learn more about Kenna

Mageni

by Mageni Security

Mageni is a powerful vulnerability management solution that empowers you to find, prioritize, remediate and manage vulnerabilities. Learn more about Mageni

Mageni is a powerful vulnerability management solution that empowers you to find, prioritize, remediate and manage vulnerabilities. Learn more about Mageni

Praetorian

by Praetorian

Our solutions enable clients to find, fix, stop, and solve cybersecurity problems across their enterprise and product portfolios. Learn more about Praetorian

Our solutions enable clients to find, fix, stop, and solve cybersecurity problems across their enterprise and product portfolios. Learn more about Praetorian

reshift

by Software Secured

SaaS-based software platform that helps software development teams identify more vulnerabilities faster in their own code. Learn more about reshift

SaaS-based software platform that helps software development teams identify more vulnerabilities faster in their own code. Learn more about reshift

RiskSense

by RiskSense

FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. Learn more about RiskSense

FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. Learn more about RiskSense

Hybrid approach to vulnerability scanning with accurate security assessment results. Learn more about SaaS Vulnerability Scanner

Hybrid approach to vulnerability scanning with accurate security assessment results. Learn more about SaaS Vulnerability Scanner

Scan engine that identifies external network vulnerabilities: add/remove targets, control frequency, and review results. Learn more about SecurityMetrics Perimeter Scan

Scan engine that identifies external network vulnerabilities: add/remove targets, control frequency, and review results. Learn more about SecurityMetrics Perimeter Scan

Sentinel IPS

by Sentinel IPS

Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business. Learn more about Sentinel IPS

Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business. Learn more about Sentinel IPS

Continuous vulnerability management solution that combines automated scanning, manual penetration testing and app learning. Learn more about SWAT - the Secure Web Application Tactics

Continuous vulnerability management solution that combines automated scanning, manual penetration testing and app learning. Learn more about SWAT - the Secure Web Application Tactics

Add-on that allows organizations to perform supervisory review of broker-dealer email to ensure compliance with regulatory bodies. Learn more about Symantec Control Compliance Suite

Add-on that allows organizations to perform supervisory review of broker-dealer email to ensure compliance with regulatory bodies. Learn more about Symantec Control Compliance Suite

Vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention. Learn more about Threat and Vulnerability Management App

Vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention. Learn more about Threat and Vulnerability Management App

TraceInsight

by TraceSecurity

A software tool that empowers you to reduce vulnerability with minimal resources. Learn more about TraceInsight

A software tool that empowers you to reduce vulnerability with minimal resources. Learn more about TraceInsight

Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more. Learn more about Unified VRM

Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more. Learn more about Unified VRM

Vulnerability management app that reveals weaknesses of working network, prioritizes them, and selects appropriate level of security. Learn more about Veracode Vulnerability Management

Vulnerability management app that reveals weaknesses of working network, prioritizes them, and selects appropriate level of security. Learn more about Veracode Vulnerability Management

VigiTrust

by VigiTrust

Security accreditation management system that helps organizations comply with information security regulations. Learn more about VigiTrust

Security accreditation management system that helps organizations comply with information security regulations. Learn more about VigiTrust

Vulnerability Management

by BeyondTrust

Vulnerability management app that allows security professionals to scan working system, detect weaknesses, and prevent intrusions. Learn more about Vulnerability Management

Vulnerability management app that allows security professionals to scan working system, detect weaknesses, and prevent intrusions. Learn more about Vulnerability Management

Filter Results (48)

Product Rating

Users

Deployment

Features


What is Vulnerability Management Software?

Vulnerability Management software helps to predict, identify, and fix potential corporate cybersecurity bridges.


Loading...